How much is "enough"? Risk in trust-based access control
暂无分享,去创建一个
[1] Jean Bacon,et al. Trust for Ubiquitous, Transparent Collaboration , 2003, Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, 2003. (PerCom 2003)..
[2] Joan Feigenbaum,et al. Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[3] Nancy G. Leveson,et al. Safeware: System Safety and Computers , 1995 .
[4] Mark Weiser. The computer for the 21st century , 1991 .
[5] Jean Bacon,et al. Access control and trust in the use of widely distributed services , 2003, Softw. Pract. Exp..